Preferred Language
Articles
/
ijs-4731
Silver Nanoparticles as a selective probe for Mercury Ions: A Review
...Show More Authors

   Nanochemistry is a significant area which involves the synthesis, design, and manipulation of particle structures with dimensions ranging from 1 to 100 nanometres. It is now one of the major concerns of pharmaceutical and biological researchers. The current study discusses recent advances in the use of silver nanoparticles (AgNPs) as a selective sensor for qualitative and colorimetric quantitative detection of mercury ions.   The synthesis of significant noble metal AgNPs is described as a novel, low-cost, quick, and simple method for detecting mercury ions. Due to the seriousness of mercury toxicity to our cells, AgNPs may be successfully employed for the detection of ecologically harmful mercury ions in a wide variety of aqueous practical samples using a colorimetric approach. As a result, as provided in this review with extensive details regarding this analytical approach, it might be utilized to monitor mercury ions via AgNPs in a variety of practical samples.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 01 2013
Journal Name
International Journal Of Advanced Research In Computer Science And Software Engineering
Real Time Motion Detection in Surveillance Camera Using MATLAB
...Show More Authors

Surveillance cameras are video cameras used for the purpose of observing an area. They are often connected to a recording device or IP network, and may be watched by a security guard or law enforcement officer. In case of location have less percentage of movement (like home courtyard during night); then we need to check whole recorded video to show where and when that motion occur which are wasting in time. So this paper aims at processing the real time video captured by a Webcam to detect motion in the Scene using MATLAB 2012a, with keeping in mind that camera still recorded which means real time detection. The results show accuracy and efficiency in detecting motion

Preview PDF
Publication Date
Fri Jan 31 2025
Journal Name
Iraqi Journal Of Science
Intrusion Detection Approach Based on DNA Signature
...Show More Authors

View Publication
Publication Date
Sun Mar 04 2018
Journal Name
Iraqi Journal Of Science
Improving Detection Rate of the Network Intrusion Detection System Based on Wrapper Feature Selection Approach
...Show More Authors

Regarding the security of computer systems, the intrusion detection systems (IDSs) are essential components for the detection of attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in real time. A major drawback of the IDS is their inability to provide adequate sensitivity and accuracy, coupled with their failure in processing enormous data. The issue of classification time is greatly reduced with the IDS through feature selection. In this paper, a new feature selection algorithm based on Firefly Algorithm (FA) is proposed. In addition, the naïve bayesian classifier is used to discriminate attack behaviour from normal behaviour in the network tra

... Show More
View Publication Preview PDF
Publication Date
Thu Jul 01 2021
Journal Name
Iraqi Journal Of Science
Vehicles Detection System at Different Weather Conditions
...Show More Authors

The importance of efficient vehicle detection (VD) is increased with the expansion of road networks and the number of vehicles in the Intelligent Transportation Systems (ITS). This paper proposes a system for detecting vehicles at different weather conditions such as sunny, rainy, cloudy and foggy days. The first step to the proposed system implementation is to determine whether the video’s weather condition is normal or abnormal. The Random Forest (RF) weather condition classification was performed in the video while the features were extracted for the first two frames by using the Gray Level Co-occurrence Matrix (GLCM). In this system, the background subtraction was applied by the mixture of Gaussian 2 (MOG 2) then applying a number

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Crossref
Publication Date
Thu Apr 28 2022
Journal Name
Iraqi Journal Of Science
Study of Land Cover Changes of Baghdad Using Multi-Temporal Landsat Satellite Images
...Show More Authors

The main goal of this work is study the land cover changes for "Baghdad city" over a period of (30) years using multi-temporal Landsat satellite images (TM, ETM+ and OLI) acquired in 1984, 2000, and 2015 respectively. In this work, The principal components analysis transform has been utilized as multi operators, (i.e. enhancement, compressor, and temporal change detector). Since most of the image band's information are presented in the first PCs image. Then, the PC1 image for all three years is partitioned into variable sized blocks using quad tree technique. Several different methods of classification have been used to classify Landsat satellite images; these are, proposed method singular value decomposition (SVD) using Visual Basic sof

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Fri Jun 24 2022
Journal Name
Iraqi Journal Of Science
Spectral Analysis of Remote Sensing Data
...Show More Authors

In the present work, different remote sensing techniques have been used to analyze remote sensing data spectrally using ENVI software. The majority of algorithms used in the Spectral Processing can be organized as target detection, change detection and classification. In this paper several methods of target detection have been studied such as matched filter and constrained energy minimization.
The water body mapping have been obtained and the results showed changes on the study area through the period 1995-2000. Also the results that obtained from applying constrained energy minimization were more accurate than other method comparing with the real situation.

View Publication Preview PDF
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Performance Evaluation of Intrusion Detection System using Selected Features and Machine Learning Classifiers
...Show More Authors

Some of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems.  Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic.  Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance.  In this study, two different sets of select

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Fri Dec 08 2023
Journal Name
Iraqi Journal Of Science
Intrusion Detection Approach Based on DNA Signature
...Show More Authors

Intrusion-detection systems (IDSs) aim at detecting attacks against computer systems and networks or, in general, against information systems. Most of the diseases in human body are discovered through Deoxyribonucleic Acid (DNA) investigations. In this paper, the DNA sequence is utilized for intrusion detection by proposing an approach to detect attacks in network. The proposed approach is a misuse intrusion detection that consists of three stages. First, a DNA sequence for a network traffic taken from Knowledge Discovery and Data mining (KDD Cup 99) is generated. Then, Teiresias algorithm, which is used to detect sequences in human DNA and assist researchers in decoding the human genome, is used to discover the Shortest Tandem Repeat (S

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 30 2022
Journal Name
Iraqi Journal Of Science
An Internet of Things Botnet Detection Model Using Regression Analysis and Linear Discrimination Analysis
...Show More Authors

The Internet of Things (IoT) has become a hot area of research in recent years due to the significant advancements in the semiconductor industry, wireless communication technologies, and the realization of its ability in numerous applications such as smart homes, health care, control systems, and military. Furthermore, IoT devices inefficient security has led to an increase cybersecurity risks such as IoT botnets, which have become a serious threat. To counter this threat there is a need to develop a model for detecting IoT botnets.

This paper's contribution is to formulate the IoT botnet detection problem and introduce multiple linear regression (MLR) for modelling IoT botnet features with discriminating capability and alleviatin

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Crossref